cloud-provider-aws
                                
                                 cloud-provider-aws copied to clipboard
                                
                                    cloud-provider-aws copied to clipboard
                            
                            
                            
                        Wrong Target Type
Trying to use in tree aws provider with Ip based targets. Also, where can I find the logs for the in-tree provider? How can I force it to re-create the target groups?
What happened: LoadBalancer targets get created with target type:instance.
What you expected to happen: Loadbalancer targets to get created with target type: ip
How to reproduce it (as minimally and precisely as possible): Create an NLB with following annotations: annotations: service.beta.kubernetes.io/aws-load-balancer-type: nlb service.beta.kubernetes.io/aws-load-balancer-nlb-target-type: ip service.beta.kubernetes.io/aws-load-balancer-backend-protocol: https service.beta.kubernetes.io/aws-load-balancer-scheme: internet-facing service.beta.kubernetes.io/aws-load-balancer-connection-draining-enabled: true service.beta.kubernetes.io/aws-load-balancer-connection-draining-timeout: 120 service.beta.kubernetes.io/aws-load-balancer-cross-zone-load-balancing-enabled: false service.beta.kubernetes.io/aws-load-balancer-healthcheck-interval: 10 service.beta.kubernetes.io/aws-load-balancer-healthcheck-timeout: 6 Anything else we need to know?: Nothing special about the environment. Environment:
- Kubernetes version (use kubectl version): Server Version: version.Info{Major:"1", Minor:"22+", GitVersion:"v1.22.9-eks-a64ea69", GitCommit:"540410f9a2e24b7a2a870ebfacb3212744b5f878", GitTreeState:"clean", BuildDate:"2022-05-12T19:15:31Z", GoVersion:"go1.16.15", Compiler:"gc", Platform:"linux/amd64"} WARNING: version difference between client (1.24) and server (1.22) exceeds the supported minor version skew of +/-1
- Cloud provider or hardware configuration: AWS EKS - 1.22,
- OS (e.g. from /etc/os-release): AMI-1.7.2-28782dce
- Kernel (e.g. uname -a):
- Install tools:
- Others:
/kind bug
@zer0stars: This issue is currently awaiting triage.
If cloud-provider-aws contributors determine this is a relevant issue, they will accept it by applying the triage/accepted label and provide further guidance.
The triage/accepted label can be added by org members by writing /triage accepted in a comment.
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.
This project is for the out-of-tree cloud-provider. When using EKS, the in-tree cloud provider is a part of the managed service, so a start may be to reach out to AWS support.
@zer0stars, the CCM doesn't support IP targets. You'd need to install the external controller AWS Load Balancer Controller https://github.com/kubernetes-sigs/aws-load-balancer-controller/.
The annotation service.beta.kubernetes.io/aws-load-balancer-type needs to be external. Note: you need to create a new service with the external annotation, not edit nlb to external.
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs.
This bot triages issues and PRs according to the following rules:
- After 90d of inactivity, lifecycle/staleis applied
- After 30d of inactivity since lifecycle/stalewas applied,lifecycle/rottenis applied
- After 30d of inactivity since lifecycle/rottenwas applied, the issue is closed
You can:
- Mark this issue or PR as fresh with /remove-lifecycle stale
- Mark this issue or PR as rotten with /lifecycle rotten
- Close this issue or PR with /close
- Offer to help out with Issue Triage
Please send feedback to sig-contributor-experience at kubernetes/community.
/lifecycle stale
The feature you are asking for here only exists for AWS Load Balancer Controller. CCM only supports instance targets.
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs.
This bot triages issues and PRs according to the following rules:
- After 90d of inactivity, lifecycle/staleis applied
- After 30d of inactivity since lifecycle/stalewas applied,lifecycle/rottenis applied
- After 30d of inactivity since lifecycle/rottenwas applied, the issue is closed
You can:
- Mark this issue or PR as fresh with /remove-lifecycle rotten
- Close this issue or PR with /close
- Offer to help out with Issue Triage
Please send feedback to sig-contributor-experience at kubernetes/community.
/lifecycle rotten
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs.
This bot triages issues according to the following rules:
- After 90d of inactivity, lifecycle/staleis applied
- After 30d of inactivity since lifecycle/stalewas applied,lifecycle/rottenis applied
- After 30d of inactivity since lifecycle/rottenwas applied, the issue is closed
You can:
- Reopen this issue with /reopen
- Mark this issue as fresh with /remove-lifecycle rotten
- Offer to help out with Issue Triage
Please send feedback to sig-contributor-experience at kubernetes/community.
/close not-planned
@k8s-triage-robot: Closing this issue, marking it as "Not Planned".
In response to this:
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs.
This bot triages issues according to the following rules:
- After 90d of inactivity,
lifecycle/staleis applied- After 30d of inactivity since
lifecycle/stalewas applied,lifecycle/rottenis applied- After 30d of inactivity since
lifecycle/rottenwas applied, the issue is closedYou can:
- Reopen this issue with
/reopen- Mark this issue as fresh with
/remove-lifecycle rotten- Offer to help out with Issue Triage
Please send feedback to sig-contributor-experience at kubernetes/community.
/close not-planned
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.